ExamGecko
Home Home / Salesforce / Certified Identity and Access Management Architect

Salesforce Certified Identity and Access Management Architect Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











Universal Containers (UC) built an integration for their employees to post, view, and vote for ideas in Salesforce from an internal Company portal. When ideas are posted in Salesforce, links to the ideas are created in the company portal pages as part of the integration process. The Company portal connects to Salesforce using OAuth. Everything is working fine, except when users click on links to existing ideas, they are always taken to the Ideas home page rather than the specific idea, after authorization. Which OAuth URL parameter can be used to retain the original requested page so that a user can be redirected correctly after OAuth authorization?

A.
Redirect_uri
A.
Redirect_uri
Answers
B.
State
B.
State
Answers
C.
Scope
C.
Scope
Answers
D.
Callback_uri
D.
Callback_uri
Answers
Suggested answer: A

Universal containers (UC) would like to enable SAML-BASED SSO for a salesforce partner community.

UC has an existing ldap identity store and a third-party portal. They would like to use the existing portal as the primary site these users access, but also want to allow seamless access to the partner community. What SSO flow should an architect recommend?

A.
User-Agent
A.
User-Agent
Answers
B.
IDP-initiated
B.
IDP-initiated
Answers
C.
Sp-Initiated
C.
Sp-Initiated
Answers
D.
Web server
D.
Web server
Answers
Suggested answer: B

Universal Containers (UC) is building an integration between Salesforce and a legacy web applications using the canvas framework. The security for UC has determined that a signed request from Salesforce is not an adequate authentication solution for the Third-Party app. Which two options should the Architect consider for authenticating the third-party app using the canvas framework? Choose 2 Answers

A.
Utilize the SAML Single Sign-on flow to allow the third-party to authenticate itself against UC's IdP.
A.
Utilize the SAML Single Sign-on flow to allow the third-party to authenticate itself against UC's IdP.
Answers
B.
Utilize Authorization Providers to allow the third-party appliction to authenticate itself against Salesforce as the Idp.
B.
Utilize Authorization Providers to allow the third-party appliction to authenticate itself against Salesforce as the Idp.
Answers
C.
Utilize Canvas OAuth flow to allow the third-party appliction to authenticate itself against Salesforce as the Idp.
C.
Utilize Canvas OAuth flow to allow the third-party appliction to authenticate itself against Salesforce as the Idp.
Answers
D.
Create a registration handler Apex class to allow the third-party appliction to authenticate itself against Salesforce as the Idp.
D.
Create a registration handler Apex class to allow the third-party appliction to authenticate itself against Salesforce as the Idp.
Answers
Suggested answer: A, C

Universal Containers (UC) wants to build a custom mobile app for their field reps to create orders in salesforce. After the first time the users log in, they must be able to access salesforce upon opening the mobile app without being prompted to log in again. What Oauth flows should be considered to support this requirement?

A.
Web Server flow with a Refresh Token.
A.
Web Server flow with a Refresh Token.
Answers
B.
Mobile Agent flow with a Bearer Token.
B.
Mobile Agent flow with a Bearer Token.
Answers
C.
User Agent flow with a Refresh Token.
C.
User Agent flow with a Refresh Token.
Answers
D.
SAML Assertion flow with a Bearer Token.
D.
SAML Assertion flow with a Bearer Token.
Answers
Suggested answer: C

What item should an Architect consider when designing a Delegated Authentication implementation?

A.
The Web service should be secured with TLS using Salesforce trusted certificates.
A.
The Web service should be secured with TLS using Salesforce trusted certificates.
Answers
B.
The Web service should be able to accept one to four input method parameters.
B.
The Web service should be able to accept one to four input method parameters.
Answers
C.
The web service should use the Salesforce Federation ID to identify the user.
C.
The web service should use the Salesforce Federation ID to identify the user.
Answers
D.
The Web service should implement a custom password decryption method.
D.
The Web service should implement a custom password decryption method.
Answers
Suggested answer: A

A group of users try to access one of Universal Containers' Connected Apps and receive the following error message: " Failed: Not approved for access." What is the most likely cause of this issue?

A.
The Connected App settings "All users may self-authorize" is enabled.
A.
The Connected App settings "All users may self-authorize" is enabled.
Answers
B.
The Salesforce Administrators have revoked the OAuth authorization.
B.
The Salesforce Administrators have revoked the OAuth authorization.
Answers
C.
The Users do not have the correct permission set assigned to them.
C.
The Users do not have the correct permission set assigned to them.
Answers
D.
The User of High Assurance sessions are required for the Connected App.
D.
The User of High Assurance sessions are required for the Connected App.
Answers
Suggested answer: C

Containers (UC) has decided to implement a federated single Sign-on solution using a third-party Idp.

In reviewing the third-party products, they would like to ensure the product supports the automated provisioning and deprovisioning of users. What are the underlining mechanisms that the UC Architect must ensure are part of the product?

A.
SOAP API for provisioning; Just-in-Time (JIT) for Deprovisioning.
A.
SOAP API for provisioning; Just-in-Time (JIT) for Deprovisioning.
Answers
B.
Just-In-time (JIT) for Provisioning; SOAP API for Deprovisioning.
B.
Just-In-time (JIT) for Provisioning; SOAP API for Deprovisioning.
Answers
C.
Provisioning API for both Provisioning and Deprovisioning.
C.
Provisioning API for both Provisioning and Deprovisioning.
Answers
D.
Just-in-Time (JIT) for both Provisioning and Deprovisioning.
D.
Just-in-Time (JIT) for both Provisioning and Deprovisioning.
Answers
Suggested answer: D

Under which scenario Web Server flow will be used?

A.
Used for web applications when server-side code needs to interact with APIS.
A.
Used for web applications when server-side code needs to interact with APIS.
Answers
B.
Used for server-side components when page needs to be rendered.
B.
Used for server-side components when page needs to be rendered.
Answers
C.
Used for mobile applications and testing legacy Integrations.
C.
Used for mobile applications and testing legacy Integrations.
Answers
D.
Used for verifying Access protected resources.
D.
Used for verifying Access protected resources.
Answers
Suggested answer: A

architect is troubleshooting some SAML-based SSO errors during testing. The Architect confirmed that all of the Salesforce SSO settings are correct. Which two issues outside of the Salesforce SSO settings are most likely contributing to the SSO errors the Architect is encountering? Choose 2 Answers

A.
The Identity Provider is also used to SSO into five other applications.
A.
The Identity Provider is also used to SSO into five other applications.
Answers
B.
The clock on the Identity Provider server is twenty minutes behind Salesforce.
B.
The clock on the Identity Provider server is twenty minutes behind Salesforce.
Answers
C.
The Issuer Certificate from the Identity Provider expired two weeks ago.
C.
The Issuer Certificate from the Identity Provider expired two weeks ago.
Answers
D.
The default language for the Identity Provider and Salesforce are Different.
D.
The default language for the Identity Provider and Salesforce are Different.
Answers
Suggested answer: B, C

Universal Containers (UC) has a Desktop application to collect leads for marketing campaigns. UC wants to extend this application to integrate with Salesforce to create leads. Integration between the desktop application and salesforce should be seamless. What Authorization flow should the Architect recommend?

A.
JWT Bearer Token flow
A.
JWT Bearer Token flow
Answers
B.
Web Server Authentication Flow
B.
Web Server Authentication Flow
Answers
C.
User Agent Flow
C.
User Agent Flow
Answers
D.
Username and Password Flow
D.
Username and Password Flow
Answers
Suggested answer: C
Total 248 questions
Go to page: of 25